Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ntp-dcf77-tools-4.2.8p18-1.1 RPM for armv6hl

From OpenSuSE Ports Tumbleweed for armv6hl

Name: ntp-dcf77-tools Distribution: openSUSE Tumbleweed
Version: 4.2.8p18 Vendor: openSUSE
Release: 1.1 Build date: Wed Feb 5 16:20:57 2025
Group: Hardware/Other Build host: reproducible
Size: 31856 Source RPM: ntp-4.2.8p18-1.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.ntp.org/
Summary: DCF77 related tools
DCF77 related programs.

There are currently two tools:
  * testdcf, a simple DCF77 raw impulse test program.
  * dcfd, a simple DCF77 raw impulse receiver with NTP loopfilter
    mechanics for synchronisation.

Provides

Requires

License

BSD-3-Clause AND MIT AND BSD-4-Clause AND GPL-2.0-only

Changelog

* Wed Feb 05 2025 Reinhard Max <max@suse.com>
  - Update to 4.2.8p18
    * obsoletes Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch
    * Multiple bug fixes and improvements. For details, see:
      /usr/share/doc/packages/ntp/ChangeLog
      http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
  - bsc#1233890: chown refclock device to ntp user on startup.
  - ntp-check-argv.patch: Improve the handling of the process name of
    the forked-off DNS resolver process.
* Fri May 24 2024 Thorsten Kukuk <kukuk@suse.com>
  - Drop initscripts-legacy support [jsc#PED264]
  - Drop rc<service> symlinks [jsc#PED-264], [jsc#PED-266]
* Wed Apr 24 2024 Marcus Meissner <meissner@suse.com>
  - Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch:
    Allow certain usages of MD5 in FIPS mode. (bsc#1222865)
* Thu Feb 22 2024 Dominique Leuenberger <dimstar@opensuse.org>
  - Use %patch -P N instead of deprecated %patchN.
* Wed Jun 07 2023 Reinhard Max <max@suse.com>
  - Update to 4.2.8p17:
    * Fix some regressions of 4.2.8p16
  - Update to 4.2.8p16:
    * [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
    * [Sec 3807], bsc#1210390, CVE-2023-26555:
      praecis_parse() in the Palisade refclock driver has a
      hypothetical input buffer overflow.
    * [Sec 3767] An OOB KoD RATE value triggers an assertion when
      debug is enabled.
    * Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch,
      ntp-ENOBUFS.patch
    * Multiple bug fixes and improvements. For details, see:
      /usr/share/doc/packages/ntp/ChangeLog
      http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
  - Follow upstream's suggestion to build with debugging disabled:
    https://www.ntp.org/support/securitynotice/ntpbug3767/
* Fri May 05 2023 Reinhard Max <max@suse.com>
  - bsc#1210386: out-of-bounds writes in mstolfp()
    * CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554
    * Add ntp-CVE-2023-26551.patch
* Tue Feb 07 2023 Reinhard Max <max@suse.com>
  - bsc#1208004: Make %post script SELinux aware
* Sat Jan 28 2023 Dirk Müller <dmueller@suse.com>
  - run bash specific post with bash
* Thu Jan 26 2023 Reinhard Max <max@suse.com>
  - boo#1207577: set /var/lib/ntp/var/run/ntp to 775
* Thu Feb 24 2022 Jonathan Kang <songchuan.kang@suse.com>
  - Modified ntp.NetworkManager: Update ntp servers on
    dhcp4-change and dhcp6-change, instead of up condition. This is
    because ntp options are available during dhcp renewed or rebound,
    and not available when the interface has been activated
    (bsc#1171547).

Files

/usr/bin/dcfd
/usr/bin/testdcf


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Feb 21 02:22:00 2025